SlideShare a Scribd company logo
1 of 51
Download to read offline
Addressing the security challenges
                                   of two emerging technologies:
                                        Mobility and Web2.0




                                     Public Sector Information Security
                                      Conference – 23 July 09, Sydney


1   www.senseofsecurity.com.au     © Sense of Security 2009               Friday, July 24, 2009
Mobility & Access to Information: Agenda


•   Business Drivers for Mobility & Web 2.0 Services
•   Intro to Web 2.0 & Mobility
•   Corporate Response – Permit or Deny
•   Current trends & relevance
•   Mobility Security Issues
•   Web Application Security Issues
•   Conclusion




2   www.senseofsecurity.com.au         © Sense of Security 2009   Friday, July 24, 2009
Statistics

We are going to be talking a lot about current statistics

So I thought I would put this disclaimer in




                                     DISCLAIMER


     “42.7 percent of all statistics are made up on the spot."
     --The Hon. W. Richard Walton, Sr.

     …. But I believe I am using credible sources and it is all referenced
 3      www.senseofsecurity.com.au       © Sense of Security 2009                Friday, July 24, 2009
Mobility & Access to Information: Agenda


•   Business Drivers for Mobility & Web 2.0 Services
•   Intro to Web 2.0 & Mobility
•   Corporate Response – Permit or Deny
•   Current trends & relevance
•   Mobility Security Issues
•   Web Application Security Issues
•   Conclusion




4   www.senseofsecurity.com.au         © Sense of Security 2009   Friday, July 24, 2009
Business Drivers


    Business needs for mobility and social networking/collaboration tools:
        • Efficient access to information from remote locations
        • Provide practical and reliable access to shared information
          regardless of geographical location and/or time zone
        • A desire to leverage contacts and content in more effective ways
        • Flexible work location options help retain skilled staff
        • Increase productivity levels in competitive markets
        • Reduce operational costs- compelling ROI




5     www.senseofsecurity.com.au   © Sense of Security 2009              Friday, July 24, 2009
People and Information

It's all about
    giving



                                                              access to




                                                              securely!
  6   www.senseofsecurity.com.au   © Sense of Security 2009               Friday, July 24, 2009
Mobility & Access to Information: Agenda


•   Market Drivers for Mobility & Web 2.0 Services
•   Intro to Web 2.0 & Mobility
•   Corporate Response – Permit or Deny
•   Current trends & relevance
•   Mobility Security Issues
•   Web Application Security Issues
•   Conclusion




7   www.senseofsecurity.com.au         © Sense of Security 2009   Friday, July 24, 2009
What is Web 2.0?


Web 2.0 refers to today’s “second generation” of Web technologies
    • includes AJAX, RSS feeds, online forums, and mashups.


In general Web 2.0 covers broader development trends:
    • Rich Internet Applications (RIA): Feature rich web sites; mimic
      thick client applications.
    • Collaboration and Participation: Generating and sharing content in
      real time; wikis, extranets, blogs, social networking sites, online
      forums.
    • Syndication: RSS or Atom feeds and mashups. Broadcasting of data.




8   www.senseofsecurity.com.au   © Sense of Security 2009              Friday, July 24, 2009
What is Web 2.0?

"Web 2.0" refers to the second generation of web development and web
design. It is characterized as facilitating communication, information
sharing, interoperability, user-centered design and collaboration on the
World Wide Web. It has led to the development and evolution of web-
based communities, hosted services, and web applications. Examples
include social-networking sites, video-sharing sites, wikis, blogs,
mashups and folksonomies.
[Ref: Wikipedia]




In contrast to the static nature of Web 1.0, Web 2.0 systems rely
heavily upon user generated content. In fact, Web 2.0 has been
described as the “participatory Web.”
[Ref: Secure Enterprise 2.0 Forum, Top Web 2.0 Security Threats, 2009]




9      www.senseofsecurity.com.au                           © Sense of Security 2009              Friday, July 24, 2009
Look familiar?

                                                    Instant Messaging          RSS
            Social Networks




                   Tagging
                                      Personalised Home Pages               Widgets




     [Source: Worklight]


10       www.senseofsecurity.com.au            © Sense of Security 2009               Friday, July 24, 2009
Thousands already and growing daily




11   www.senseofsecurity.com.au          © Sense of Security 2009   Friday, July 24, 2009
Show me the access!




        So you provided the platform to share the
     information, now how do I access it, use it and
                        store it?




12   www.senseofsecurity.com.au   © Sense of Security 2009                 Friday, July 24, 2009
Access required from everywhere




13   www.senseofsecurity.com.au       © Sense of Security 2009   Friday, July 24, 2009
Forget about the cables




14   www.senseofsecurity.com.au   © Sense of Security 2009             Friday, July 24, 2009
We need mobility, availability & storage




15   www.senseofsecurity.com.au             © Sense of Security 2009   Friday, July 24, 2009
Instantaneous gratification




      “96% of the time people have their cell phones
                 within 1 meter of them”
                                  [Ref Tony Saigh, business development manager for mobile at Skype
                                   http://www.cnet.com.au/skype-s-mobile-dreams-339285053.htm]




16   www.senseofsecurity.com.au                        © Sense of Security 2009                       Friday, July 24, 2009
Mobility & Access to Information: Agenda


•    Market Drivers for Mobility & Web 2.0 Services
•    Intro to Web 2.0 & Mobility
•    Corporate Response – Permit or Deny
•    Current trends & relevance
•    Web Application Security Issues
•    Mobility Security Issues
•    Conclusion




17   www.senseofsecurity.com.au         © Sense of Security 2009   Friday, July 24, 2009
The corporate response

The usual (corporate) response is a mixture between




… and complete




18   www.senseofsecurity.com.au   © Sense of Security 2009           Friday, July 24, 2009
Being too restrictive?

Usually when access to information is
completely restricted, with the intention
of protecting the information, you don’t
derive the benefit from the available
technology and improved methods.


and this happens




19   www.senseofsecurity.com.au   © Sense of Security 2009                   Friday, July 24, 2009
People find a way around it anyway

     Internet application usage has expanded dramatically—to the point where
     virtually all corporations have employees using at least one such application:
     survey results indicate that 97% of end-users now use one or more of these
     Internet applications, up from 85% reported last year.
     [The Collaborative Internet: Usage Trends, End User Attitudes and IT Impact. Facetime, Oct 2008]




     Industry estimates state that 60% of corporate data resides on unprotected
     PCs and laptops, 10% of laptops are lost or stolen in the first year of
     purchase, and 66% of USB devices are lost or misplaced in their lifetimes
     [Google, 2009. www.google.com/apps/intl/en/business/switch_benefits.html ]



     A December 2007 survey conducted by the Ponemon Institute found that 4 out
     of 10 employees reported losing a laptop, mobile phone, PDA, or flash drive
     containing company data.
     In that same study, more than half of employees report copying sensitive
     information to flash drives, even though 87% of those companies had policies
     prohibiting the practice.
     [Survey of US IT Practitioners Reveals Data Security Policies Not Enforced,” Ponemon Institute, 2007]




20     www.senseofsecurity.com.au                             © Sense of Security 2009                       Friday, July 24, 2009
Build it and they will come …
Some what connected people (Web 1.0)              Who know they should be more
                                                  connected




     So they get together to share
     information and collaborate

                                                                Web 2.0




21      www.senseofsecurity.com.au   © Sense of Security 2009                    Friday, July 24, 2009
Mobility & Access to Information: Agenda


•    Market Drivers for Mobility & Web 2.0 Services
•    Intro to Web 2.0 & Mobility
•    Corporate Response – Permit or Deny
•    Current trends & relevance
•    Mobility Security Issues
•    Web Application Security Issues
•    Conclusion




22   www.senseofsecurity.com.au         © Sense of Security 2009   Friday, July 24, 2009
Why should you care about Web 2.0?

Consumer (i.e. "Web 2.0") technologies are already finding their way into
  the enterprise.
   • Employees use (sanctioned and unsanctioned) consumer tools to
     perform day-to-day business tasks
   • Enterprise applications use consumer technologies to provide the
     latest and greatest in usability and functionality
   • Examples include: instant messaging, blogs, mashups, wikis

……..and Web Applications are the focus of attacks
     • Web applications in general have become the Achilles heel of
       Corporate IT Security.
     • Nearly 55% of all vulnerability disclosures in 2008 affect Web
       applications
     • SQL injection jumped 134% and replaced cross-site scripting as the
       predominant type of Web application vulnerability (several hundred
       thousand per day at the end of 2008).
          [Source: IBM]



23   www.senseofsecurity.com.au          © Sense of Security 2009   Friday, July 24, 2009
It’s real




• 78% of IT organizations are concerned about the risks of employee-
  driven, unsanctioned use of Web 2.0 tools and technologies
     [Source: Forrester Research]




• 50% of respondents said they "customize their work environment
  moderately or aggressively" (including the use of unsanctioned tools)
  and will continue to do so.
     [Source: Gartner Research poll]




24   www.senseofsecurity.com.au        © Sense of Security 2009      Friday, July 24, 2009
So how much information is out there?

     • 487,000,000,000 Gigabytes of Digital Content Today to Double
       Every 18 Months (IDC, 19May09)
           [http://www.infoniac.com/hi-tech/digital-content-today-to-double-every-18-months.html]



     • 133,000,000 – number of blogs indexed by Technorati since 2002
     • 900,000 – average number of blog posts in a 24 hour period
     • 1,200,000,000 – number of YouTube videos viewed per day
       (Techcrunch 9Jun09)
     • 20 hours – amount of video are uploaded to YouTube every minute
       (TechCrunch May09)
     • 65,000 iPhone apps online; 1,500,000,000 downloaded and more
       than 100,000 developers (MX News, July 15)

     [Ref: http://thefuturebuzz.com/2009/01/12/social-media-web-20-internet-numbers-stats/]




25     www.senseofsecurity.com.au                          © Sense of Security 2009                 Friday, July 24, 2009
So some adopt it




26   www.senseofsecurity.com.au   © Sense of Security 2009              Friday, July 24, 2009
And sometimes things go wrong




                            HORRIBLY
                             WRONG

27   www.senseofsecurity.com.au     © Sense of Security 2009   Friday, July 24, 2009
Sensitive information published online




                                                                      http://laurelpapworth.com/facebook-mi6-
                                                                      wifes-photos/




28   www.senseofsecurity.com.au            © Sense of Security 2009                                   Friday, July 24, 2009
And even the technologists are affected




A Must Read: http://www.techcrunch.com/2009/07/19/the-anatomy-of-
the-twitter-attack/
29   www.senseofsecurity.com.au             © Sense of Security 2009   Friday, July 24, 2009
Data copied to mobile devices and lost




         http://blog.absolute.com/category/security-breach/




30   www.senseofsecurity.com.au                          © Sense of Security 2009   Friday, July 24, 2009
Mobile Malware




 [Ref: http://www.arnnet.com.au/article/311467/analysts_see_alarming_development_mobile_malware?eid=-217]
31     www.senseofsecurity.com.au                        © Sense of Security 2009                           Friday, July 24, 2009
Mobility & Access to Information: Agenda


•    Market Drivers for Mobility & Web 2.0 Services
•    Intro to Web 2.0 & Mobility
•    Corporate Response – Permit or Deny
•    Current trends & relevance
•    Mobility Security Issues
•    Web Application Security Issues
•    Conclusion




32   www.senseofsecurity.com.au         © Sense of Security 2009   Friday, July 24, 2009
And why does it happen? Mobility

Adoption of mobility solutions requires enterprise security to be
  extended BEYOND the enterprise perimeter.

     • There is no corporate policy
     • The backdoor is left open with USB keys.
     • The side entrance door is left open with the wireless network.
     • Information is published (read LEAKED) to
       blogs/collaboration/info sharing sites.
     • Laptops, removable media, mobile phones store vast amounts of
       sensitive data and are still seldom encrypted.
     • Data in transit is seldom encrypted.
     • Poor (if any) authentication to corporate data for mobile users.




33   www.senseofsecurity.com.au       © Sense of Security 2009      Friday, July 24, 2009
5 Steps to Mobility Security

     Policy
         • Create a policy that covers the device lifecycle, from
            selection to recovery.
     Data In Motion
         • Encrypt all data over mobile and WiFi networks. Use VPN
            clients or application layer encryption.
     Data at Rest
         • Encrypt data stored on device. Manage cached data with
            3rd party software and passwords.
     Malware Protection
         • Protect against malware with policy (Bluetooth,
            downloads) and technology (anti-malware SW).
     Authentication
         • Require user authentication at points required for
            acceptable risk/aggravation.
     [Ref: Opus1, Five Steps To Securing Mobile Devices, 2008]


34     www.senseofsecurity.com.au                                © Sense of Security 2009    Friday, July 24, 2009
Mobility & Access to Information: Agenda


•    Market Drivers for Mobility & Web 2.0 Services
•    Intro to Web 2.0 & Mobility
•    Corporate Response – Permit or Deny
•    Current trends & relevance
•    Mobility Security Issues
•    Web Application Security Issues
•    Conclusion




35   www.senseofsecurity.com.au         © Sense of Security 2009   Friday, July 24, 2009
And why does it happen? Web Collaboration


Social:
    • Too much personal information online
    • Very grey lines about what is private
    • Changes with demographic

Result:
   • Easier social engineering attacks...
   • Sensitive information inadvertently published (MI6 example
      shown earlier)




36   www.senseofsecurity.com.au   © Sense of Security 2009        Friday, July 24, 2009
Credentials are gold




"Reproduced with permission. Please visit www.SecurityCartoon.com for more material."


37     www.senseofsecurity.com.au                     © Sense of Security 2009                  Friday, July 24, 2009
So they can

Take your money ….




                                                               Or sell your data to make
                                                               money ….


  38   www.senseofsecurity.com.au   © Sense of Security 2009                          Friday, July 24, 2009
TMI: Too Much Information

Snapshot study: Mint (www.mint.com)
   • An online free web application helping users with managing their
     money and budgeting
   • Downloads, categorises, and graphs all of your finances
     automatically every day
   • Users are required to supply their account credentials including pins
     and passwords (Read only access for analysis only)
   • Over 1 million users (Jul 2009)
   • Adding over 3,000 users every day
   • Connects to more than 7,500 US financial institutions
   • Mobile Access – Mint for iPhone
   • Mint does not offer terms and conditions that guarantee anything.
     You provide them with Power of Attorney. You indemnify them
     against all claims. Mint is not responsible or liable to you.


39   www.senseofsecurity.com.au   © Sense of Security 2009         Friday, July 24, 2009
Mint continued …

     • The usernames and passwords you use to access your online financial
       accounts are not viewable by Mint.com employees or contractors.
     • This information is collected from you one time only in order to establish
       a persistent connection to your financial institutions.
     • Your credentials are encrypted and securely passed to our online service
       providers who maintain them in order to deliver your transactional data
       to the Mint service.
     • The information is never stored on the Mint.com site
     BUT
     • On their own forum site they selectively answer questions
     • Ask any question as long as they have a marketing style answer for it
     • Some serious posts about viewing someone else’s account information
       ignored

     Sounds like a good idea but perhaps not quite there yet



40   www.senseofsecurity.com.au     © Sense of Security 2009               Friday, July 24, 2009
“Remember Me” functionality


                                                                                         Impact: Increases
                                                                                         the possibility of
                                                                                         cross-site
                                                                                         scripting &
                                                                                         similar session
                                                                                         hijacking attacks




 "Reproduced with permission. Please visit www.SecurityCartoon.com for more material."


41     www.senseofsecurity.com.au                     © Sense of Security 2009                      Friday, July 24, 2009
Password Security $%^@!@#$@#$




     • Many applications limit password length and complexity!

     • So even if users try to adopt good password measures they
       can’t.

     • This forces the user to be insecure.




42   www.senseofsecurity.com.au      © Sense of Security 2009      Friday, July 24, 2009
SSL


 • Why do so many sites not enforce SSL Logon?

 • Even if SSL Logon is enforced – may still succumb to
   threats.
      Ref SSLStrip tool. Redirects through ARP Spoof and
      creates a MITM attack.

 • Always check server certificate.




43   www.senseofsecurity.com.au   © Sense of Security 2009   Friday, July 24, 2009
Web 2.0 Security Trends

      According to a recent report based on analysis of recent “web hacking
      incidents of importance” it is concluded that :
            • Web 2.0 services and sites lead the list with highest number of
            all recorded incidents (21%).


            • Most popular attack vectors exploiting Web 2.0 features are SQL
            injection (21% of attacks) and Authentication abuse (18%). A new
            emerging threat is Cross Site Request Forgery (CSRF) that
            currently ranks as the 6th most popular attack vector with 8% of
            the reported attacks.


            • Leakage of sensitive information remains the most common
            outcome of web hacks (29%), while disinformation follows with
            26%, mostly due to hacking of online identities of celebrities.
[Ref: Secure Enterprise 2.0 Forum; WEB 2.0 HACKING INCIDENTS & TRENDS 2009 Q1]


 44      www.senseofsecurity.com.au                         © Sense of Security 2009         Friday, July 24, 2009
Web 2.0 is different but still the same




[Ref: Secure Enterprise 2.0 Forum; WEB 2.0 HACKING INCIDENTS & TRENDS 2009 Q1]

    45     www.senseofsecurity.com.au                          © Sense of Security 2009   Friday, July 24, 2009
Who is being attacked?




      Speaker's Note: Sample size unknown. This sample may not
      accurately represent the Australian landscape.

[Ref: Secure Enterprise 2.0 Forum; WEB 2.0 HACKING INCIDENTS & TRENDS 2009 Q1]


 46      www.senseofsecurity.com.au                         © Sense of Security 2009              Friday, July 24, 2009
What is motivation/outcome of attack?




[Ref: Secure Enterprise 2.0 Forum; WEB 2.0 HACKING INCIDENTS & TRENDS 2009 Q1]

    47     www.senseofsecurity.com.au                          © Sense of Security 2009   Friday, July 24, 2009
Key steps to web application security
     If Developing
          • Develop Securely. Use Secure Coding Guidelines. Ref
            OWASP
          • Run Vulnerability Management Lifecycle Program.
            Complement with frequent penetration tests.
     If using 3rd party
          • Review security measures in place.
          • Understand how your information is secured.
          • Review and understand T&C’s of the service.
     Firewalling
          • Use Web Application Firewalls and Application/Protocol
            firewalls.
          • Traditional network firewalls over no protection.
     Engage with experts
          • Understand threat landscape.
          • Perform technical and business aligned security reviews
48   www.senseofsecurity.com.au          © Sense of Security 2009     Friday, July 24, 2009
Mobility & Access to Information: Agenda


•    Market Drivers for Mobility & Web 2.0 Services
•    Intro to Web 2.0 & Mobility
•    Corporate Response – Permit or Deny
•    Current trends & relevance
•    Mobility Security Issues
•    Web Application Security Issues
•    Conclusion




49   www.senseofsecurity.com.au         © Sense of Security 2009   Friday, July 24, 2009
Summary

 • Web 2.0 is both a set of technologies as well as a new set of
   consumer behaviours.
 • The interactive internet is growing daily and here to stay.
 • Those who do not adopt these emerging technologies will eventually
   be left behind.
 • Attacks against web applications are on the increase. Protect
   yourself against all attack vectors. Review web applications
   frequently.
 • Data Loss will continue to plague organisations. Know where and
   what your data is and encrypt it in motion and at rest.
 • Effective mobility solutions are required to deliver cross platform,
   multi vector access to web applications.
 • You can find the balance between                 and




50   www.senseofsecurity.com.au   © Sense of Security 2009        Friday, July 24, 2009
Thank You




                                                Thank You
                                   Murray Goldschmidt – General Manager
                                         Sense of Security Pty Ltd
                                           Tel: +61 2 9290 4444
                                       info@senseofsecurity.com.au
                                       www.senseofsecurity.com.au

              Sense of Security is an endorsed supplier to the
     NSW Government ICT Services Panel (2020) for Whole of Government




51    www.senseofsecurity.com.au                © Sense of Security 2009       Friday, July 24, 2009

More Related Content

Viewers also liked

CIS14: Building Blocks for Mobile Authentication and Security
CIS14: Building Blocks for Mobile Authentication and SecurityCIS14: Building Blocks for Mobile Authentication and Security
CIS14: Building Blocks for Mobile Authentication and SecurityCloudIDSummit
 
Telus Analyst Briefing mobile security and managed mobility sept 2012 v6 gc ss
Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ssTelus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss
Telus Analyst Briefing mobile security and managed mobility sept 2012 v6 gc ssGraham Chalk
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Chris Genazzio
 
Security and Privacy in the current e-mobility charging infrastructure
Security and Privacy in the current e-mobility charging infrastructureSecurity and Privacy in the current e-mobility charging infrastructure
Security and Privacy in the current e-mobility charging infrastructureAchim Friedland
 
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...Andris Soroka
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersCisco Mobility
 

Viewers also liked (7)

CIS14: Building Blocks for Mobile Authentication and Security
CIS14: Building Blocks for Mobile Authentication and SecurityCIS14: Building Blocks for Mobile Authentication and Security
CIS14: Building Blocks for Mobile Authentication and Security
 
Telus Analyst Briefing mobile security and managed mobility sept 2012 v6 gc ss
Telus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ssTelus Analyst Briefing   mobile security and managed mobility sept 2012 v6 gc ss
Telus Analyst Briefing mobile security and managed mobility sept 2012 v6 gc ss
 
Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview Enterprise Mobility+Security Overview
Enterprise Mobility+Security Overview
 
Security and Privacy in the current e-mobility charging infrastructure
Security and Privacy in the current e-mobility charging infrastructureSecurity and Privacy in the current e-mobility charging infrastructure
Security and Privacy in the current e-mobility charging infrastructure
 
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
Data Security Solutions @ Lithuania CIO Forum 2015 - Mobility will happen by ...
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
 
Mobility switch security architecture scott calzia madani adjali
Mobility switch security architecture scott calzia madani adjaliMobility switch security architecture scott calzia madani adjali
Mobility switch security architecture scott calzia madani adjali
 

Similar to Addressing Security Challenges of Mobility and Web 2.0 2009

Nils Puhlmann Ncoic Slides
Nils Puhlmann Ncoic SlidesNils Puhlmann Ncoic Slides
Nils Puhlmann Ncoic SlidesGovCloud Network
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challengexKinAnx
 
Three Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security SuperheroThree Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security SuperheroSkycure
 
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Jeremy Siewert
 
Cloud Technology to Facilitate Growth
Cloud Technology to Facilitate GrowthCloud Technology to Facilitate Growth
Cloud Technology to Facilitate GrowthIconnyx
 
Get to know infoSec - EEESE2014 presentation - Duko Team
Get to know infoSec - EEESE2014  presentation - Duko TeamGet to know infoSec - EEESE2014  presentation - Duko Team
Get to know infoSec - EEESE2014 presentation - Duko TeamAhmed EL Murtada
 
AWS re:Invent Comes to London 2019 - Database, Analytics, AI &ML
AWS re:Invent Comes to London 2019 - Database, Analytics, AI &MLAWS re:Invent Comes to London 2019 - Database, Analytics, AI &ML
AWS re:Invent Comes to London 2019 - Database, Analytics, AI &MLAmazon Web Services
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud ComputingAshish Patel
 
Managing and Securing Web 2.0
Managing and Securing Web 2.0Managing and Securing Web 2.0
Managing and Securing Web 2.0Jason Edelstein
 
Financial Analyst Day 2013
Financial Analyst Day 2013Financial Analyst Day 2013
Financial Analyst Day 2013avelinakauffman
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityIBM Security
 
Windows Azure Partner Presentation
Windows Azure Partner PresentationWindows Azure Partner Presentation
Windows Azure Partner PresentationWes Yanaga
 
Early skysight presentation tony knors
Early skysight presentation tony knorsEarly skysight presentation tony knors
Early skysight presentation tony knorsTony Knors
 
Tufin SecureCloud
Tufin SecureCloudTufin SecureCloud
Tufin SecureCloudMatt Kerr
 
Embracing the Public Cloud with Herb VanHook
Embracing the Public Cloud with Herb VanHookEmbracing the Public Cloud with Herb VanHook
Embracing the Public Cloud with Herb VanHookBMC Software
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Security
 
Virtualisation: Pitfalls in Corporate VMware Implementations
Virtualisation: Pitfalls in Corporate VMware ImplementationsVirtualisation: Pitfalls in Corporate VMware Implementations
Virtualisation: Pitfalls in Corporate VMware ImplementationsJason Edelstein
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Surveyinventionjournals
 

Similar to Addressing Security Challenges of Mobility and Web 2.0 2009 (20)

Nils Puhlmann Ncoic Slides
Nils Puhlmann Ncoic SlidesNils Puhlmann Ncoic Slides
Nils Puhlmann Ncoic Slides
 
Presentation cloud security the grand challenge
Presentation   cloud security the grand challengePresentation   cloud security the grand challenge
Presentation cloud security the grand challenge
 
Three Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security SuperheroThree Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security Superhero
 
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
Mobile trends and academic opportunities presented at Strathmore and JKUAT Un...
 
Cloud Technology to Facilitate Growth
Cloud Technology to Facilitate GrowthCloud Technology to Facilitate Growth
Cloud Technology to Facilitate Growth
 
Get to know infoSec - EEESE2014 presentation - Duko Team
Get to know infoSec - EEESE2014  presentation - Duko TeamGet to know infoSec - EEESE2014  presentation - Duko Team
Get to know infoSec - EEESE2014 presentation - Duko Team
 
AWS re:Invent Comes to London 2019 - Database, Analytics, AI &ML
AWS re:Invent Comes to London 2019 - Database, Analytics, AI &MLAWS re:Invent Comes to London 2019 - Database, Analytics, AI &ML
AWS re:Invent Comes to London 2019 - Database, Analytics, AI &ML
 
Security in Cloud Computing
Security in Cloud ComputingSecurity in Cloud Computing
Security in Cloud Computing
 
Managing and Securing Web 2.0
Managing and Securing Web 2.0Managing and Securing Web 2.0
Managing and Securing Web 2.0
 
Unisys Mobility Solutions
Unisys Mobility SolutionsUnisys Mobility Solutions
Unisys Mobility Solutions
 
Nw2w circuit demo
Nw2w circuit demoNw2w circuit demo
Nw2w circuit demo
 
Financial Analyst Day 2013
Financial Analyst Day 2013Financial Analyst Day 2013
Financial Analyst Day 2013
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud Security
 
Windows Azure Partner Presentation
Windows Azure Partner PresentationWindows Azure Partner Presentation
Windows Azure Partner Presentation
 
Early skysight presentation tony knors
Early skysight presentation tony knorsEarly skysight presentation tony knors
Early skysight presentation tony knors
 
Tufin SecureCloud
Tufin SecureCloudTufin SecureCloud
Tufin SecureCloud
 
Embracing the Public Cloud with Herb VanHook
Embracing the Public Cloud with Herb VanHookEmbracing the Public Cloud with Herb VanHook
Embracing the Public Cloud with Herb VanHook
 
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
IBM Mobile Security: A Comprehensive Approach to Securing and Managing the Mo...
 
Virtualisation: Pitfalls in Corporate VMware Implementations
Virtualisation: Pitfalls in Corporate VMware ImplementationsVirtualisation: Pitfalls in Corporate VMware Implementations
Virtualisation: Pitfalls in Corporate VMware Implementations
 
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A SurveyTrust based Mechanism for Secure Cloud Computing Environment: A Survey
Trust based Mechanism for Secure Cloud Computing Environment: A Survey
 

More from Jason Edelstein

Sense of Security Best practice strategies to improve your enterprise security
Sense of Security Best practice strategies to improve your enterprise securitySense of Security Best practice strategies to improve your enterprise security
Sense of Security Best practice strategies to improve your enterprise securityJason Edelstein
 
Sense of security - Virtualisation Security for Regulated Environments
Sense of security -  Virtualisation Security for Regulated EnvironmentsSense of security -  Virtualisation Security for Regulated Environments
Sense of security - Virtualisation Security for Regulated EnvironmentsJason Edelstein
 
Sense of Security - Securing Virtualised Environments; Focus on the Fundamentals
Sense of Security - Securing Virtualised Environments; Focus on the FundamentalsSense of Security - Securing Virtualised Environments; Focus on the Fundamentals
Sense of Security - Securing Virtualised Environments; Focus on the FundamentalsJason Edelstein
 
PCI What When AISA Sydney 2009
PCI What When AISA Sydney 2009PCI What When AISA Sydney 2009
PCI What When AISA Sydney 2009Jason Edelstein
 
PCI Compliance a Business Issue Isaca 2009
PCI Compliance a Business Issue Isaca 2009PCI Compliance a Business Issue Isaca 2009
PCI Compliance a Business Issue Isaca 2009Jason Edelstein
 
PCI Compliance What Does This Mean For the Australian Market Place 2007
PCI Compliance What Does This Mean For the Australian Market Place 2007PCI Compliance What Does This Mean For the Australian Market Place 2007
PCI Compliance What Does This Mean For the Australian Market Place 2007Jason Edelstein
 
Achieving PCI Compliance Long And Short Term Strategies 2009
Achieving PCI Compliance Long And Short Term Strategies 2009Achieving PCI Compliance Long And Short Term Strategies 2009
Achieving PCI Compliance Long And Short Term Strategies 2009Jason Edelstein
 
VoIP: Attacks & Countermeasures in the Corporate World
VoIP: Attacks & Countermeasures in the Corporate WorldVoIP: Attacks & Countermeasures in the Corporate World
VoIP: Attacks & Countermeasures in the Corporate WorldJason Edelstein
 

More from Jason Edelstein (8)

Sense of Security Best practice strategies to improve your enterprise security
Sense of Security Best practice strategies to improve your enterprise securitySense of Security Best practice strategies to improve your enterprise security
Sense of Security Best practice strategies to improve your enterprise security
 
Sense of security - Virtualisation Security for Regulated Environments
Sense of security -  Virtualisation Security for Regulated EnvironmentsSense of security -  Virtualisation Security for Regulated Environments
Sense of security - Virtualisation Security for Regulated Environments
 
Sense of Security - Securing Virtualised Environments; Focus on the Fundamentals
Sense of Security - Securing Virtualised Environments; Focus on the FundamentalsSense of Security - Securing Virtualised Environments; Focus on the Fundamentals
Sense of Security - Securing Virtualised Environments; Focus on the Fundamentals
 
PCI What When AISA Sydney 2009
PCI What When AISA Sydney 2009PCI What When AISA Sydney 2009
PCI What When AISA Sydney 2009
 
PCI Compliance a Business Issue Isaca 2009
PCI Compliance a Business Issue Isaca 2009PCI Compliance a Business Issue Isaca 2009
PCI Compliance a Business Issue Isaca 2009
 
PCI Compliance What Does This Mean For the Australian Market Place 2007
PCI Compliance What Does This Mean For the Australian Market Place 2007PCI Compliance What Does This Mean For the Australian Market Place 2007
PCI Compliance What Does This Mean For the Australian Market Place 2007
 
Achieving PCI Compliance Long And Short Term Strategies 2009
Achieving PCI Compliance Long And Short Term Strategies 2009Achieving PCI Compliance Long And Short Term Strategies 2009
Achieving PCI Compliance Long And Short Term Strategies 2009
 
VoIP: Attacks & Countermeasures in the Corporate World
VoIP: Attacks & Countermeasures in the Corporate WorldVoIP: Attacks & Countermeasures in the Corporate World
VoIP: Attacks & Countermeasures in the Corporate World
 

Recently uploaded

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 

Recently uploaded (20)

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 

Addressing Security Challenges of Mobility and Web 2.0 2009

  • 1. Addressing the security challenges of two emerging technologies: Mobility and Web2.0 Public Sector Information Security Conference – 23 July 09, Sydney 1 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 2. Mobility & Access to Information: Agenda • Business Drivers for Mobility & Web 2.0 Services • Intro to Web 2.0 & Mobility • Corporate Response – Permit or Deny • Current trends & relevance • Mobility Security Issues • Web Application Security Issues • Conclusion 2 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 3. Statistics We are going to be talking a lot about current statistics So I thought I would put this disclaimer in DISCLAIMER “42.7 percent of all statistics are made up on the spot." --The Hon. W. Richard Walton, Sr. …. But I believe I am using credible sources and it is all referenced 3 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 4. Mobility & Access to Information: Agenda • Business Drivers for Mobility & Web 2.0 Services • Intro to Web 2.0 & Mobility • Corporate Response – Permit or Deny • Current trends & relevance • Mobility Security Issues • Web Application Security Issues • Conclusion 4 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 5. Business Drivers Business needs for mobility and social networking/collaboration tools: • Efficient access to information from remote locations • Provide practical and reliable access to shared information regardless of geographical location and/or time zone • A desire to leverage contacts and content in more effective ways • Flexible work location options help retain skilled staff • Increase productivity levels in competitive markets • Reduce operational costs- compelling ROI 5 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 6. People and Information It's all about giving access to securely! 6 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 7. Mobility & Access to Information: Agenda • Market Drivers for Mobility & Web 2.0 Services • Intro to Web 2.0 & Mobility • Corporate Response – Permit or Deny • Current trends & relevance • Mobility Security Issues • Web Application Security Issues • Conclusion 7 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 8. What is Web 2.0? Web 2.0 refers to today’s “second generation” of Web technologies • includes AJAX, RSS feeds, online forums, and mashups. In general Web 2.0 covers broader development trends: • Rich Internet Applications (RIA): Feature rich web sites; mimic thick client applications. • Collaboration and Participation: Generating and sharing content in real time; wikis, extranets, blogs, social networking sites, online forums. • Syndication: RSS or Atom feeds and mashups. Broadcasting of data. 8 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 9. What is Web 2.0? "Web 2.0" refers to the second generation of web development and web design. It is characterized as facilitating communication, information sharing, interoperability, user-centered design and collaboration on the World Wide Web. It has led to the development and evolution of web- based communities, hosted services, and web applications. Examples include social-networking sites, video-sharing sites, wikis, blogs, mashups and folksonomies. [Ref: Wikipedia] In contrast to the static nature of Web 1.0, Web 2.0 systems rely heavily upon user generated content. In fact, Web 2.0 has been described as the “participatory Web.” [Ref: Secure Enterprise 2.0 Forum, Top Web 2.0 Security Threats, 2009] 9 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 10. Look familiar? Instant Messaging RSS Social Networks Tagging Personalised Home Pages Widgets [Source: Worklight] 10 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 11. Thousands already and growing daily 11 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 12. Show me the access! So you provided the platform to share the information, now how do I access it, use it and store it? 12 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 13. Access required from everywhere 13 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 14. Forget about the cables 14 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 15. We need mobility, availability & storage 15 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 16. Instantaneous gratification “96% of the time people have their cell phones within 1 meter of them” [Ref Tony Saigh, business development manager for mobile at Skype http://www.cnet.com.au/skype-s-mobile-dreams-339285053.htm] 16 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 17. Mobility & Access to Information: Agenda • Market Drivers for Mobility & Web 2.0 Services • Intro to Web 2.0 & Mobility • Corporate Response – Permit or Deny • Current trends & relevance • Web Application Security Issues • Mobility Security Issues • Conclusion 17 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 18. The corporate response The usual (corporate) response is a mixture between … and complete 18 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 19. Being too restrictive? Usually when access to information is completely restricted, with the intention of protecting the information, you don’t derive the benefit from the available technology and improved methods. and this happens 19 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 20. People find a way around it anyway Internet application usage has expanded dramatically—to the point where virtually all corporations have employees using at least one such application: survey results indicate that 97% of end-users now use one or more of these Internet applications, up from 85% reported last year. [The Collaborative Internet: Usage Trends, End User Attitudes and IT Impact. Facetime, Oct 2008] Industry estimates state that 60% of corporate data resides on unprotected PCs and laptops, 10% of laptops are lost or stolen in the first year of purchase, and 66% of USB devices are lost or misplaced in their lifetimes [Google, 2009. www.google.com/apps/intl/en/business/switch_benefits.html ] A December 2007 survey conducted by the Ponemon Institute found that 4 out of 10 employees reported losing a laptop, mobile phone, PDA, or flash drive containing company data. In that same study, more than half of employees report copying sensitive information to flash drives, even though 87% of those companies had policies prohibiting the practice. [Survey of US IT Practitioners Reveals Data Security Policies Not Enforced,” Ponemon Institute, 2007] 20 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 21. Build it and they will come … Some what connected people (Web 1.0) Who know they should be more connected So they get together to share information and collaborate Web 2.0 21 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 22. Mobility & Access to Information: Agenda • Market Drivers for Mobility & Web 2.0 Services • Intro to Web 2.0 & Mobility • Corporate Response – Permit or Deny • Current trends & relevance • Mobility Security Issues • Web Application Security Issues • Conclusion 22 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 23. Why should you care about Web 2.0? Consumer (i.e. "Web 2.0") technologies are already finding their way into the enterprise. • Employees use (sanctioned and unsanctioned) consumer tools to perform day-to-day business tasks • Enterprise applications use consumer technologies to provide the latest and greatest in usability and functionality • Examples include: instant messaging, blogs, mashups, wikis ……..and Web Applications are the focus of attacks • Web applications in general have become the Achilles heel of Corporate IT Security. • Nearly 55% of all vulnerability disclosures in 2008 affect Web applications • SQL injection jumped 134% and replaced cross-site scripting as the predominant type of Web application vulnerability (several hundred thousand per day at the end of 2008). [Source: IBM] 23 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 24. It’s real • 78% of IT organizations are concerned about the risks of employee- driven, unsanctioned use of Web 2.0 tools and technologies [Source: Forrester Research] • 50% of respondents said they "customize their work environment moderately or aggressively" (including the use of unsanctioned tools) and will continue to do so. [Source: Gartner Research poll] 24 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 25. So how much information is out there? • 487,000,000,000 Gigabytes of Digital Content Today to Double Every 18 Months (IDC, 19May09) [http://www.infoniac.com/hi-tech/digital-content-today-to-double-every-18-months.html] • 133,000,000 – number of blogs indexed by Technorati since 2002 • 900,000 – average number of blog posts in a 24 hour period • 1,200,000,000 – number of YouTube videos viewed per day (Techcrunch 9Jun09) • 20 hours – amount of video are uploaded to YouTube every minute (TechCrunch May09) • 65,000 iPhone apps online; 1,500,000,000 downloaded and more than 100,000 developers (MX News, July 15) [Ref: http://thefuturebuzz.com/2009/01/12/social-media-web-20-internet-numbers-stats/] 25 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 26. So some adopt it 26 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 27. And sometimes things go wrong HORRIBLY WRONG 27 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 28. Sensitive information published online http://laurelpapworth.com/facebook-mi6- wifes-photos/ 28 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 29. And even the technologists are affected A Must Read: http://www.techcrunch.com/2009/07/19/the-anatomy-of- the-twitter-attack/ 29 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 30. Data copied to mobile devices and lost http://blog.absolute.com/category/security-breach/ 30 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 31. Mobile Malware [Ref: http://www.arnnet.com.au/article/311467/analysts_see_alarming_development_mobile_malware?eid=-217] 31 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 32. Mobility & Access to Information: Agenda • Market Drivers for Mobility & Web 2.0 Services • Intro to Web 2.0 & Mobility • Corporate Response – Permit or Deny • Current trends & relevance • Mobility Security Issues • Web Application Security Issues • Conclusion 32 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 33. And why does it happen? Mobility Adoption of mobility solutions requires enterprise security to be extended BEYOND the enterprise perimeter. • There is no corporate policy • The backdoor is left open with USB keys. • The side entrance door is left open with the wireless network. • Information is published (read LEAKED) to blogs/collaboration/info sharing sites. • Laptops, removable media, mobile phones store vast amounts of sensitive data and are still seldom encrypted. • Data in transit is seldom encrypted. • Poor (if any) authentication to corporate data for mobile users. 33 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 34. 5 Steps to Mobility Security Policy • Create a policy that covers the device lifecycle, from selection to recovery. Data In Motion • Encrypt all data over mobile and WiFi networks. Use VPN clients or application layer encryption. Data at Rest • Encrypt data stored on device. Manage cached data with 3rd party software and passwords. Malware Protection • Protect against malware with policy (Bluetooth, downloads) and technology (anti-malware SW). Authentication • Require user authentication at points required for acceptable risk/aggravation. [Ref: Opus1, Five Steps To Securing Mobile Devices, 2008] 34 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 35. Mobility & Access to Information: Agenda • Market Drivers for Mobility & Web 2.0 Services • Intro to Web 2.0 & Mobility • Corporate Response – Permit or Deny • Current trends & relevance • Mobility Security Issues • Web Application Security Issues • Conclusion 35 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 36. And why does it happen? Web Collaboration Social: • Too much personal information online • Very grey lines about what is private • Changes with demographic Result: • Easier social engineering attacks... • Sensitive information inadvertently published (MI6 example shown earlier) 36 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 37. Credentials are gold "Reproduced with permission. Please visit www.SecurityCartoon.com for more material." 37 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 38. So they can Take your money …. Or sell your data to make money …. 38 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 39. TMI: Too Much Information Snapshot study: Mint (www.mint.com) • An online free web application helping users with managing their money and budgeting • Downloads, categorises, and graphs all of your finances automatically every day • Users are required to supply their account credentials including pins and passwords (Read only access for analysis only) • Over 1 million users (Jul 2009) • Adding over 3,000 users every day • Connects to more than 7,500 US financial institutions • Mobile Access – Mint for iPhone • Mint does not offer terms and conditions that guarantee anything. You provide them with Power of Attorney. You indemnify them against all claims. Mint is not responsible or liable to you. 39 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 40. Mint continued … • The usernames and passwords you use to access your online financial accounts are not viewable by Mint.com employees or contractors. • This information is collected from you one time only in order to establish a persistent connection to your financial institutions. • Your credentials are encrypted and securely passed to our online service providers who maintain them in order to deliver your transactional data to the Mint service. • The information is never stored on the Mint.com site BUT • On their own forum site they selectively answer questions • Ask any question as long as they have a marketing style answer for it • Some serious posts about viewing someone else’s account information ignored Sounds like a good idea but perhaps not quite there yet 40 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 41. “Remember Me” functionality Impact: Increases the possibility of cross-site scripting & similar session hijacking attacks "Reproduced with permission. Please visit www.SecurityCartoon.com for more material." 41 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 42. Password Security $%^@!@#$@#$ • Many applications limit password length and complexity! • So even if users try to adopt good password measures they can’t. • This forces the user to be insecure. 42 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 43. SSL • Why do so many sites not enforce SSL Logon? • Even if SSL Logon is enforced – may still succumb to threats. Ref SSLStrip tool. Redirects through ARP Spoof and creates a MITM attack. • Always check server certificate. 43 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 44. Web 2.0 Security Trends According to a recent report based on analysis of recent “web hacking incidents of importance” it is concluded that : • Web 2.0 services and sites lead the list with highest number of all recorded incidents (21%). • Most popular attack vectors exploiting Web 2.0 features are SQL injection (21% of attacks) and Authentication abuse (18%). A new emerging threat is Cross Site Request Forgery (CSRF) that currently ranks as the 6th most popular attack vector with 8% of the reported attacks. • Leakage of sensitive information remains the most common outcome of web hacks (29%), while disinformation follows with 26%, mostly due to hacking of online identities of celebrities. [Ref: Secure Enterprise 2.0 Forum; WEB 2.0 HACKING INCIDENTS & TRENDS 2009 Q1] 44 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 45. Web 2.0 is different but still the same [Ref: Secure Enterprise 2.0 Forum; WEB 2.0 HACKING INCIDENTS & TRENDS 2009 Q1] 45 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 46. Who is being attacked? Speaker's Note: Sample size unknown. This sample may not accurately represent the Australian landscape. [Ref: Secure Enterprise 2.0 Forum; WEB 2.0 HACKING INCIDENTS & TRENDS 2009 Q1] 46 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 47. What is motivation/outcome of attack? [Ref: Secure Enterprise 2.0 Forum; WEB 2.0 HACKING INCIDENTS & TRENDS 2009 Q1] 47 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 48. Key steps to web application security If Developing • Develop Securely. Use Secure Coding Guidelines. Ref OWASP • Run Vulnerability Management Lifecycle Program. Complement with frequent penetration tests. If using 3rd party • Review security measures in place. • Understand how your information is secured. • Review and understand T&C’s of the service. Firewalling • Use Web Application Firewalls and Application/Protocol firewalls. • Traditional network firewalls over no protection. Engage with experts • Understand threat landscape. • Perform technical and business aligned security reviews 48 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 49. Mobility & Access to Information: Agenda • Market Drivers for Mobility & Web 2.0 Services • Intro to Web 2.0 & Mobility • Corporate Response – Permit or Deny • Current trends & relevance • Mobility Security Issues • Web Application Security Issues • Conclusion 49 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 50. Summary • Web 2.0 is both a set of technologies as well as a new set of consumer behaviours. • The interactive internet is growing daily and here to stay. • Those who do not adopt these emerging technologies will eventually be left behind. • Attacks against web applications are on the increase. Protect yourself against all attack vectors. Review web applications frequently. • Data Loss will continue to plague organisations. Know where and what your data is and encrypt it in motion and at rest. • Effective mobility solutions are required to deliver cross platform, multi vector access to web applications. • You can find the balance between and 50 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009
  • 51. Thank You Thank You Murray Goldschmidt – General Manager Sense of Security Pty Ltd Tel: +61 2 9290 4444 info@senseofsecurity.com.au www.senseofsecurity.com.au Sense of Security is an endorsed supplier to the NSW Government ICT Services Panel (2020) for Whole of Government 51 www.senseofsecurity.com.au © Sense of Security 2009 Friday, July 24, 2009